Another MVA free course this time about PowerShell Version 5

Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Be sure to check out this course, and get the details that can enable you to begin using these features immediately.

Explore the new features in PowerShell, including changes in security, scripting, debugging, and administration role management, along with the PowerShell Gallery, ScriptAnalyzer, and DSC. Plus, learn to install modules, implement the Wait Debugger, look at Just Enough Administration, and much more.                                    

1 | Introduction to PowerShell v5

Get an overview of the new features in PowerShell v5.
 
2 | Package Management

Learn what’s new with package management in PowerShell v5

3 | PowerShell v5 Security

Get the details on what’s new with security in PowerShell v5.

4 | PowerShell v5 Debugging

Take a look at what’s new with debugging in PowerShell v5.
 
5 | PowerShell Classes

Learn about classes in PowerShell v5.
 
6 | Just Enough Administration

Hear about the new Just Enough Administration feature in PowerShell v5.
 
7 | Desired State Configuration

Find out what’s new with DSC in PowerShell v5.
 

  Learn about features in PowerShell.

  • Explore DSC.
  • See new ISE improvements.
  • Explore the PowerShell Gallery.
  • See and use PowerShellGet.
  • Take a look at PowerShell ScriptAnalyzer.
  • Install modules.
  • Explore system-wide transcripts.
  • Explore script block logging.
  • Implement the Wait Debugger.
  • Find out about Just Enough Administration.
  • Explore DSC resources.
  • Review debugging and DSC.

To take this course Click HERE

Another Free MVA course this time on Windows 2016 Server

Corey Hynes and Ward Ralston teach this course about the features and functionality that have been added to this new version of Windows Server, along with those that were modified from previous versions.

See demonstrations and get high-level overviews, from a practical and a conceptual standpoint. Take a look at what’s new in Windows Server 2016 Hyper-V and software-defined networking, learn about the latest in software-defined storage, and hear about security features, including Credential Guard. Plus, explore containers and Nano Server, along with implementation and management.                                    

1 | Instructor Introductions and Prep

Meet your instructors, and learn what you should know as you come to this course.

2 | Introduction to Windows Server 2016

Get a high-level overview of what’s new in Windows Server 2016, from a conceptual standpoint.

3 | The Software-Defined Datacenter – Part 1

Take a look at what’s new in Windows Server 2016 Hyper-V and software-defined networking.

4 | The Software-Defined Datacenter – Part 2

Get a high-level overview of what’s new in Windows Server 2016 storage, including software-defined storage.
 
Go here to take the course

Free Class on Power Tools for Windows 10

Another MVA class  Dive into Windows 10 with award-winning journalist and Windows Expert Ed Bott, along with Microsoft Technical Evangelist Jennelle Crothers, in this course covering tips, shortcuts, and top utilities for Windows 10.
Every IT Pro knows from firsthand experience that the sheer volume of Windows programs and accessories says a lot about its power and complexity. In these seven modules, get advice and hands-on training on Windows 10 tools that can help you work faster and smarter, including File Explorer, Event Viewer, Task Manager, and more. Plus, review tools for all skill levels, from end users to experts and professionals.  

1 | Power Tools for Windows 10

Learn how to use the search box and the Quick Links menu to find what you’re looking for and access key utilities.

2 | File Explorer

Get the most of out the File Explorer, and learn the ins and outs of libraries and how to search for files like a pro.

3 | Registry Editor

Learn how the registry works and how to carefully make changes to get your system to work the way you want it to.

4 | Event Viewer and Task Manager

Learn how to get the most from the Event Viewer and the Task Manager so you can identify potential problems and wrangle misbehaving apps.

5 | Disk Management

Learn how to create and manage disk partitions, protect your files with BitLocker, and optimize your drives.

6 | Sysinternals Suite and DaRT

Use the Sysinternals Suite and the Diagnostic and Recovery Toolset (DaRT) to get even more detailed information on the tasks and processes running on your system.

7 | Hyper-V and Microsoft Azure

Learn how to create, use, and manage virtual machines both on your machine and in Microsoft Azure.


To view the course click Here

Free Ebook From Microsoft that you can download

Part of the “Microsoft Azure Essentials” series, this ebook helps SQL Server database users understand Microsoft’s offering for SQL Server in Azure. Learn how SQL Server in Azure is similar to SQL Server in an on-premises environment, and how they are different. The author, a content lead for Azure.com, walks you through the steps of getting started with SQL Server in an Azure virtual machine and with Azure SQL Database. Follow the numerous screenshots to create a trial subscription, create SQL Server in an Azure virtual machine, create an Azure SQL Database, migrate an on-premises database to each Azure environment, create users, back up and restore data, and archive data
 You can get the book Here

Extortion E-mail Schemes Tied to Recent High-Profile Data Breaches

The Internet Crime Complaint Center (IC3) continues to receive reports from individuals who have received extortion attempts via e-mail related to recent high-profile data thefts. The recipients are told that personal information, such as their name, phone number, address, credit card information, and other personal details, will be released to the recipient’s social media contacts, family, and friends if a ransom is not paid. The recipient is instructed to pay in Bitcoin, a virtual currency that provides a high degree of anonymity to the transactions. The recipients are typically given a short deadline. The ransom amount ranges from 2 to 5 bitcoins or approximately $250 to $1,200.
The following are some examples of the extortion e-mails:

“Unfortunately your data was leaked in a recent corporate hack and I now have your information. I have also used your user profile to find your social media accounts. Using this I can now message all of your friends and family members.”

“If you would like to prevent me from sharing this information with your friends and family members (and perhaps even your employers too) then you need to send the specified bitcoin payment to the following address.”

“If you think this amount is too high, consider how expensive a divorce lawyer is. If you are already divorced then I suggest you think about how this information may impact any ongoing court proceedings. If you are no longer in a committed relationship then think about how this information may affect your social standing amongst family and friends.”

“We have access to your Facebook page as well. If you would like to prevent me from sharing this dirt with all of your friends, family members, and spouse, then you need to send exactly 5 bitcoins to the following address.”

“We have some bad news and good news for you. First, the bad news, we have prepared a letter to be mailed to the following address that details all of your activities including your profile information, your login activity, and credit card transactions. Now for the good news, You can easily stop this letter from being mailed by sending 2 bitcoins to the following address.”

Fraudsters quickly use the news release of a high-profile data breach to initiate an extortion campaign. The FBI suspects multiple individuals are involved in these extortion campaigns based on variations in the extortion emails.

If you believe you have been a victim of this scam, you should reach out to your local FBI field office, and file a complaint with the IC3 at www.ic3.gov. Please include the keyword “Extortion E-mail Scheme” in your complaint, and provide any relevant information in your complaint, including the extortion e-mail with header information and Bitcoin address if available.

 
Tips to protect yourself:
  • Do not open e-mail or attachments from unknown individuals.
  • Monitor your bank account statements regularly, as well and as your credit report at least once a year for any fraudulent activity.
  • Do not communicate with the subject.
  • Do not store sensitive or embarrassing photos of yourself online or on your mobile devices.
  • Use strong passwords and do not use the same password for multiple websites.
  • Never provide personal information of any sort via e-mail. Be aware, many e-mails requesting your personal information appear to be legitimate.
  • Ensure security settings for social media accounts are turned on and set at the highest level of protection.
  • When providing personally identifiable information, credit card information, or other sensitive information to a website, ensure the transmission is secure by verifying the URL prefix includes https, or the status bar displays a “lock” icon.

The FBI does not condone the payment of extortion demands as the funds will facilitate continued criminal activity, including potential organized crime activity and associated violent crimes.

This is a repost of a FBI Public Service announcement